Thanks a ton. After setting ciphers to aNULL, my program worked.

Thanks again.

----- Original Message ----
From: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
To: openssl-users@openssl.org
Sent: Thursday, January 17, 2008 8:47:01 PM
Subject: Re: Got error on TLSv1 handshake when server is not sending its 
certificate to client


Hello,
> I have a written a simple client-server program in which I am trying
 to 
communicate 
> between client and server using SSL by setting peer authentication
 OFF 
on both sides.
> 
> When I don't set any certificates on server side, I am getting this 
error s3_srvr.c
> (985): 41153: no shared cipher
> 
> If I set certificate on server side, it is working fine. 
> 
> I have read TLSv1 RFC2246, in 7.3 section, they have given server 
sending its 
> certificate is optional.
> 
> So, is it a restriction/limitation on openssl side? OR Am I doing any
 
mistake?. I tried 
> look for the similar problems in openssl mail archive, but could not 
find any.
This is because anonymous ciphers are disabled by default.
You may test this with:
 $ openssl s_server -nocert
 $ openssl s_client
this will give you no shared cipher.
But if you enable anonymous ciphers:
 $ openssl s_server -nocert -cipher aNULL
 $ openssl s_client -cipher aNULL
connection will be established properly.
Of course commands:
 $ openssl s_server -nocert -cipher ALL
 $ openssl s_client -cipher ALL
works too. 

Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]






      
____________________________________________________________________________________
Be a better friend, newshound, and 
know-it-all with Yahoo! Mobile.  Try it now.  
http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ 

Reply via email to